Arbitrary Code Execution Vulnerability in Bentley MicroStation CONNECT
CVE-2022-28306
7.8HIGH
Summary
This vulnerability exposes installations of Bentley MicroStation CONNECT to arbitrary code execution, enabling remote attackers to take control of the process. The exploit requires user interaction, as the target must open a malicious OBJ file. The flaw results from inadequate validation of user-supplied data length when parsing OBJ files, leading to potential buffer overflow conditions. An attacker can leverage this weakness to execute arbitrary code with the privileges of the current process, posing a significant risk to affected systems.
Affected Version(s)
MicroStation CONNECT 10.16.02.034
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Anonymous